Pre-loaded With Certificate Patents (Class 713/173)
-
Publication number: 20080008316Abstract: A system and method for enterprise security including symmetric key protection. In accordance with an embodiment, the system provides a higher level of protection against unauthorized key disclosure by encrypting randomly generated seed data used for key generation, and using digital signatures and asymmetric encryption.Type: ApplicationFiled: July 5, 2006Publication date: January 10, 2008Applicant: BEA SYSTEMS, INC.Inventor: Denis Pilipchuk
-
Publication number: 20080010455Abstract: An object known as an identity object comprises a public key and a private key pair and at least one certificate issued by a certificate authority that certifies that the public key of the pair is genuine. In one embodiment, this object may be used as proof of identification by using the private key to sign data provided to it or signals derived from the data. An identity object may be stored in a non-volatile memory as proof of identity, where the memory is controlled by a controller. Preferably, a housing encloses the memory and the controller. In another embodiment, an identity object may be stored in a non-volatile memory of a memory system as proof of identity. The memory system is removably connected to a host device. After the host device has been successfully authenticated, the private key of the object is used to encrypt data from the host device or signals derived from said data, and the at least one certificate and the encrypted data or signals are sent to the host device.Type: ApplicationFiled: November 6, 2006Publication date: January 10, 2008Inventors: Michael Holtzman, Ron Barzilai, Fabrice Jogand-Coulomb
-
Patent number: 7313701Abstract: The invention provides for robust efficient distributed generation of RSA keys. An efficient protocol is one which is independent of the primality test “circuit size”, while a robust protocol allows correct completion even in the presence of a minority of arbitrarily misbehaving malicious parties. The disclosed protocol is secure against any minority of malicious parties (which is optimal). The disclosed method is useful in establishing sensitive distributed cryptographic function sharing services (certification authorities, signature schemes with distributed trust, and key escrow authorities), as well as other applications besides RSA (namely: composite ElGamal, identification schemes, simultaneous bit exchange, etc.). The disclosed method can be combined with proactive function sharing techniques to establish the first efficient, optimal-resilience, robust and proactively-secure RSA-based distributed trust services where the key is never entrusted to a single entity (i.e.Type: GrantFiled: May 21, 2001Date of Patent: December 25, 2007Assignee: CQR Cert, LLCInventors: Yair Frankel, Marcel M. Yung, Philip D. MacKenzie
-
Patent number: 7310706Abstract: A microprocessor includes random cache line refill ordering to lessen side channel leakage in a cache line and thus thwart cryptanalysis attacks such as timing attacks, power analysis attacks, and probe attacks. A random sequence generator is used to randomize the order in which memory locations are read when filling a cache line.Type: GrantFiled: May 10, 2002Date of Patent: December 18, 2007Assignee: MIPS Technologies, Inc.Inventors: Morten Stribaek, Jakob Schou Jensen, Jean-Francois Dhem
-
Publication number: 20070283143Abstract: A system and method for certificate-based client registration via a document processing device is provided. A client device, having an operating system disparate from a document processing device on a computer network, connects to the document processing device to procure a valid digital certificate. The document processing device receives authentication data from the client device, which is then verified by a trusted authentication server. The document processing device, based upon the verification by the authentication server, authenticates the certificate request made by the client device. The document processing device then forwards the authenticated certificate request to a trusted certificate server for issuance of a digital certificate. The certificate server issues the digital certificate, which is then returned to the document processing device.Type: ApplicationFiled: June 6, 2006Publication date: December 6, 2007Inventors: Sameer Yami, Amir Shahindoust
-
Publication number: 20070283157Abstract: A system and method for enabling secure communications from a shared multifunction peripheral device is provided. The shared multifunction peripheral device first receives identification data representative of an associated user requesting a document processing operation. Upon authentication of the user, a key pair is generated by the shared multifunction peripheral device. The shared multifunction peripheral device also generates a limited operation certificate, restricting the user to a particular function offered by the shared multifunction peripheral device. The certificate is then stored by the shared multifunction peripheral device and the private key is encrypted using the received identification data. The public key and encrypted private key are then stored by the shared multifunction peripheral device. An electronic mail message is then generated by the shared multifunction peripheral device and digitally signed using the private key, whereupon it is transmitted to one or more designated recipients.Type: ApplicationFiled: June 5, 2006Publication date: December 6, 2007Inventors: Sameer Yami, Amir Shahindoust
-
Patent number: 7305550Abstract: A system and method for facilitating authentication or identification services including an authentication server configured to provide an authentication certificate to a user of a first client device for authentication or identification of a user of a second client device. The first and second client devices are configured to communicate with each other and the authentication server. Each of the first and second client devices includes a user control program configured to communicate data to and from the authentication server. A media gateway is coupled to the authentication server to enable communication of media data from the first and second client devices to the authentication server. The user control program of the first client device is configured to receive a certificate corresponding to the user of the second client device and the authentication certificate from the authentication server.Type: GrantFiled: December 29, 2000Date of Patent: December 4, 2007Assignee: Intel CorporationInventors: Neal C. Oliver, Michael A. Yudkowsky
-
Patent number: 7302703Abstract: Intelligent hardware token processors (5) are capable of sending and receiving encrypted messages. Generic initialization with non-user-specific certificates comprising public and private keys allows a certificate authority (210) to securely communicate with the hardware token. New users enrolling with the certificate server (210) have their hardware tokens securely reprogrammed with user specific certificates.Type: GrantFiled: December 20, 2000Date of Patent: November 27, 2007Assignee: AOL, LLC a Delaware limited liability companyInventor: William Burns
-
Patent number: 7287159Abstract: Software is identified while in main memory by examining small portions of its executable image or by examining the results of its execution. These portions, or an encoding of them, are then compared with previously stored identifying information about at least one Software through an approximate matching process.Type: GrantFiled: April 1, 2004Date of Patent: October 23, 2007Assignee: ShieldIP, Inc.Inventors: Michael O. Rabin, Dennis E. Shasha, Carleton J. Bosley, Ramon Caceres, Aaron Ingram, Timir Karia, David Molnar, Yossi Beinart
-
Patent number: 7281132Abstract: The present invention provides for token based signing of an unsigned binary which may be a stream of bits (e.g., 0's and 1's). The unsigned binary is signed using a secret key which resides in a token (e.g., a smart card), which makes the secret key available to the token holder. The unsigned binary is downloaded and verified for authenticity by the token coupled to a computing device. In one embodiment, the downloaded unsigned binary is encrypted. If the unsigned binary is authentic, it may be used to replace the prior firmware on that computing device.Type: GrantFiled: October 19, 2001Date of Patent: October 9, 2007Assignee: Sun Microsystems, Inc.Inventors: Michael S. Bender, Benjamin H. Stoltz
-
Publication number: 20070234055Abstract: There is provided a communication system in which a network device and an information processing device are communicatably connected to each other through a network. The network device comprises a certificate providing unit to transmit an electronic certificate to the information processing device through the network; and a printing unit configured to print an image of a public key corresponding to the electronic certificate. The information processing device comprises: a certificate reception unit to receive the electronic certificate from the certificate providing unit through the network; an image output unit to generate and output an image of the public key described in the received electronic certificate; and an installation unit configured to install the electronic certificate onto the information processing device in response to a fact that the generated image of the public key is output by the image output unit and a command for installation of an electronic certificate is received.Type: ApplicationFiled: March 29, 2007Publication date: October 4, 2007Inventors: Kiyotaka Ohara, Masafumi Miyazawa
-
Publication number: 20070226488Abstract: A system for protecting digital files is provided. The system includes at least one client computer and a server connected to the at lease one server. Each client computer includes: a file identifier generating module, for generating a file identifier for a digital file; a key generating module, for generating a key for the digital file; and a data encoding module, for encrypting the digital file according to the key. The server includes an identification validating module for determining whether a user intending to access the digital file has a corresponding access right, according to the user's digital certificate information. A related method is also provided.Type: ApplicationFiled: December 1, 2006Publication date: September 27, 2007Applicant: HON HAI PRECISION INDUSTRY CO., LTD.Inventors: BOR-CHUAN LIN, GAO-PENG HU, JIAN HUANG, CAI-YANG LUO
-
Patent number: 7275109Abstract: A communication system, for use with a communications network, includes a client configured to communicate with the server via the network. The client includes an input configured to receive a communication from a server via the network, a data set with identifiable portions, and an apparatus coupled to the interface and coupled and configured to select a portion of the data set, the apparatus being further configured to process the selected portion of the data set and a portion of the communication in accordance with an authentication function to produce an authentication result, where the selected portion of the data set is configured to serve a function independent of being used in accordance with the authentication function.Type: GrantFiled: April 2, 2002Date of Patent: September 25, 2007Assignee: Nortel Networks LimitedInventor: Michael G. Lee
-
Publication number: 20070220258Abstract: A credibility computing apparatus calculates credibility of a certificate based on use duration of the certificate. The use duration is a duration from the date of issue of the certificate to the current date.Type: ApplicationFiled: August 23, 2006Publication date: September 20, 2007Inventors: Hironobu Kitajima, Ryo Ochitani
-
Patent number: 7272723Abstract: A compact, self-contained, personal key is disclosed. The personal key comprises a USB-compliant interface releaseably coupleable to a host processing device; a memory; and a processor. The processor provides the host processing device conditional access to data storable in the memory as well as the functionality required to manage files stored in the personal key and for performing computations based on the data in the files. In one embodiment, the personal key also comprises an integral user input device and an integral user output device. The input and output devices communicate with the processor by communication paths which are independent from the USB-compliant interface, and thus allow the user to communicate with the processor without manifesting any private information external to the personal key.Type: GrantFiled: November 24, 1999Date of Patent: September 18, 2007Assignee: SafeNet, Inc.Inventors: Shawn D. Abbott, Bahram Afghani, Mehdi Sotoodeh, Norman L. Denton, III, Calvin W. Long
-
Patent number: 7272656Abstract: In an address management system, an interface ID can be handed over from one apparatus to another without losing the correspondence between the interface ID and a user. As a result, the interface ID can be used as a unique identifier for the user. Accordingly, an effective infrastructure for individualized services is achieved. The interface ID may be constant for one user even when an apparatus is replaced, and thus IPv6 communication can be used as a user-associated address in high availability services, such as telephone services. Furthermore, the interface ID can be returned and reused, and thus the interface ID can be efficiently used.Type: GrantFiled: August 7, 2002Date of Patent: September 18, 2007Assignee: Sony CorporationInventor: Yutaka Miyoshi
-
Patent number: 7269844Abstract: A device that secures a token from unauthorized use is disclosed. The device comprises a user interface for accepting a personal identifier, a processor, communicatively coupled to the user interface device, and a token interface. The token interface includes a token interface IR emitter that produces an IR signal having information included in the PIN. The token IR emitter is coupled to the processor and is further communicatively coupled to a token IR sensor when the token is physically coupled with the token interface. The token interface also includes a shield, substantially opaque to the IR signal, for substantially confining the reception of the IR signal to the token IR sensor. In one embodiment, the shield substantially circumscribes the IR emitter. In another embodiment, the interface also comprises a token interface IR sensor, which allows communications from the token to the device as well.Type: GrantFiled: July 3, 2001Date of Patent: September 11, 2007Assignee: SafeNet, Inc.Inventors: Laszlo Elteto, Shawn D. Abbott, James Khalaf, Reed H. Tibbetts, Mehdi Sotoodeh, Calvin W. Long
-
Patent number: 7257710Abstract: The present invention provides an additional-watermark embedding apparatus for embedding predetermined additional data into original data. The additional-watermark embedding apparatus includes an adder for summing the original data and the additional data, a first amplifier for amplifying the original data according to a predetermined non-linear input-output characteristic, a second amplifier for amplifying the summed data supplied from the adder according to a predetermined non-linear input-output characteristic, a subtractor for taking the difference between the amplified data obtained by the second amplifier and the amplified original data obtained by the first amplifier, and an embedder for embedding modified additional data which is obtained by modifying the waveform of the additional data according to the original data and which is supplied from the subtractor into the original data.Type: GrantFiled: August 19, 2002Date of Patent: August 14, 2007Assignee: Sony CorporationInventors: Jun Hirai, Yoonki Choi
-
Patent number: 7257708Abstract: Various embodiments pertain to steganographically authenticating identities and authorizing transactions based on the authenticated identities.Type: GrantFiled: August 25, 2005Date of Patent: August 14, 2007Assignee: Microsoft CorporationInventor: Scott B. Guthery
-
Publication number: 20070186110Abstract: An information processing apparatus includes: a data processing unit that acquires content codes including a data processing program recorded in an information recording medium and executes data processing according to the content codes; and a memory that stores an apparatus certificate including an apparatus identifier of the information processing apparatus. The data processing unit is configured to execute an apparatus checking process applying the apparatus certificate stored in the memory on the basis of a code for apparatus checking process included in the content codes, acquire the apparatus identifier recorded in the apparatus certificate after the apparatus checking process, and execute data processing applying content codes corresponding to the acquired apparatus identifier.Type: ApplicationFiled: January 25, 2007Publication date: August 9, 2007Applicant: Sony CorporationInventor: Yoshikazu Takashima
-
Patent number: 7228155Abstract: The present invention relates to a process for providing a RF module configured to convert a nontraditional transaction device for traditional transaction completion. The RF module is placed in physical and logical communication with a microprocessor of a nontraditional transaction device for receiving a personalization file to enable the RF module to complete RF transactions. In an exemplary embodiment, the microprocessor is configured to receive the personalization file from a mobile device account provider subsequent to an end user establishing communication with the device account provider and notifying the provider that a RF module is to be personalized. The mobile device account provider may receive the personalization file from a RF module account issuer and provide the personalization file to the RF module via the mobile device microprocessor.Type: GrantFiled: October 15, 2004Date of Patent: June 5, 2007Assignee: American Express Travel Related Services Company, Inc.Inventor: Peter D. Saunders
-
Patent number: 7222240Abstract: A “dual” personal key/token is disclosed. The “dual” personal key is useful for installing drivers and other command interfaces which allow the personal key to be coupled to and used with a host computer. In a first embodiment, the personal key operates as a USB hub, and reports two devices, a storage device and a personal key, to the host computer. In a second embodiment presents a single device, and different portions of the personal key are activated as required.Type: GrantFiled: November 6, 2002Date of Patent: May 22, 2007Assignee: Safenet, Inc.Inventor: Laszlo Elteto
-
Patent number: 7216231Abstract: A method of establishing a secure communications link between a user communications device and a first service communications device; the method comprises the steps of initiating a communications link using a first communications protocol between the user communications device and the first service communications device; performing, based on a PIN value, an initialisation procedure between the user communications device and the first service communications device, the initialisation procedure resulting in an identification key; storing the identification key in the user communications device and the first service communications device; the method is characterised in that it further comprises the steps of using a second communications protocol to perform a transaction between the user communications device and a second service communications device; generating and storing the PIN value; the invention further relates to a communications system and a mobile communications device.Type: GrantFiled: February 7, 2002Date of Patent: May 8, 2007Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventor: Christian Gehrmann
-
Patent number: 7207060Abstract: Method, system and computer program product for secure ticketing in a communications device. In particular, the method, system and computer program product utilizes cryptography and an external, read-write security element to securely transmit and store critical data utilized by users of a communications device. Using the present invention, third-parties can prevent the fraudulent use of third-party services without detection.Type: GrantFiled: January 22, 2002Date of Patent: April 17, 2007Assignee: Nokia CorporationInventors: Olli Immonen, Nadarajah Asokan, Panu S. Markkanen
-
Patent number: 7206936Abstract: A method and computer program to revoke and update a token (130) having several encryption, signature and role certificates/private keys contained in the token (130). The certificates/private keys in the token 130 are transmitted wrapped by a public key and may only be activated by a private key contained in the token (130). The activation of any certificate/private key requires the entry of a passphrase by a user (132). Further, all certificates/private keys contained in a token (130) are stored in an authoritative database 104. In the event that a token (130) is lost then all certificates/private keys associated with the token (130) are revoked. Further, when new certificates/private keys are issued to a user (132) these certificates/private keys are encrypted using the token's (130) public key and downloaded to the token (130).Type: GrantFiled: December 19, 2001Date of Patent: April 17, 2007Assignee: Northrop Grumman CorporationInventors: Kenneth W. Aull, Thomas C. Kerr, William E. Freeman, Mark A. Bellmore
-
Patent number: 7197639Abstract: This invention relates to cryptographic communications methods and systems that protect a server from a connection depletion attack. Specifically, the invention presents a method for allocating a resource comprising the steps of receiving a resource allocation request from a client, imposing a computational task and a time limit for correct completion of the task upon the client, verifying that the task was performed correctly within the time limit, and allocating the resource if the task was correctly performed within the time limit.Type: GrantFiled: February 2, 2000Date of Patent: March 27, 2007Assignee: RSA Security Inc.Inventors: Ari Juels, John Brainard
-
Patent number: 7194759Abstract: A trusted co-server, and a method of using a trusted co-server, for a service provider. The co-server executes a program such that: for multiple parties P0–Pn (where Po is said co-server), each party Pi may (optionally) provide input Ii, and then said co-server carries out N functions: Fi (io . . . In) describes what the co-server returns to party Pi. The preferred embodiment of the invention raises the trust level of the computation and data storage at the server. For instance, this invention may be witness to authenticity of certain data coming back to the client. This data can include assertions from the trusted co-server about the server content and configuration. The invention, also, can provide privacy of data going back to the server, by keeping it encrypted between the client and the co-server, and then re-encrypting it before inserting it into the server.Type: GrantFiled: September 15, 2000Date of Patent: March 20, 2007Assignee: International Business Machines CorporationInventors: David M. Chess, Joan Dyer, Naomaru Itoi, Jeff Kravitz, Elaine Rivette Palmer, Ronald Perez, Sean William Smith
-
Patent number: 7176849Abstract: An apparatus and technique for allowing wireless electronic badges to temporarily establish a wireless network (e.g., a piconet network) with a network security station mounted in a facility of an employer, a gym, a membership club, etc. The wireless electronic badges automatically exchange user code with the network security station, and receives relevant badge information for display and use by that particular secured facility. In a preferred embodiment, BLUETOOTH technology is used in the wireless piconet front ends of the electronic wireless badge and the network security station. The disclosed electronic wireless badge includes an LCD display, a display controller, an information exchange module, and a wireless front end (e.g., a wireless piconet network such as a BLUETOOTH network). The electronic wireless badge includes a unique user code which is passed to the network security station.Type: GrantFiled: August 15, 2000Date of Patent: February 13, 2007Assignee: Agere Systems Inc.Inventors: Philip D. Mooney, Jian Wu
-
Patent number: 7134145Abstract: In a limited-copy protection scheme, a check-out/check-in system is configured to a) verify that the receiving device is a certified conforming device, and b) verify that the device that checks-in content material is the same device that checked-out the content material. The verification of the receiving device is effected via a conventional certification process. The verification that the same device is used for check-in and check-out is effected via a secure challenge-response protocol. As contrast to a conventional contemporaneous challenge-response protocol, the system provides a challenge that is specific to the receiving device when the content material is checked-out, and verifies the appropriate response when the content material is checked-in. Because the challenge-response is specific to the receiving device, only the device that receives the challenge when the content material is checked-out can provide the appropriate response when the content material is checked-in.Type: GrantFiled: April 13, 2000Date of Patent: November 7, 2006Assignee: Koninklijke Philips Electronics N.V.Inventor: Michael A. Epstein
-
Patent number: 7131007Abstract: A system and method of retrieving a watermark in a watermarked signal are disclosed. The watermarked signal comprises odd and even overlapped blocks where the watermark is contained in the even blocks. The method comprises, for each k-th even block, subtracting the two adjacent odd blocks from the k-th even block of the watermarked signal to retrieve {overscore (s)}*k(n), transforming {overscore (s)}*k(n) into the frequency domain to generate {overscore (S)}k(f), calculating a phase of {overscore (S)}k(f) as {overscore (?)}(f) and a phase of Sk(f) as ?(f), calculating the difference ?(f) between {overscore (?)}(f) and ?(f), unwrapping ?(f) to obtain the phase modulation {tilde over (?)}k(f), and using a Viterbi search to retrieve the watermark embedded in {tilde over (?)}k(f).Type: GrantFiled: March 26, 2002Date of Patent: October 31, 2006Assignee: AT & T Corp.Inventors: James David Johnston, Shyh-Shiaw Kuo, Schuyler Reynier Quackenbush, William Turin
-
Patent number: 7123717Abstract: A countermeasure method in an electronic component which uses an RSA-type public key cryptographic algorithm. A first countermeasure method uses a random calculation for each new execution of the decryption algorithm with CRT. The calculations are made modulo p*r and q*t, r and t being random numbers. A second countermeasure makes the recombination random using the CRT theorem.Type: GrantFiled: October 13, 2000Date of Patent: October 17, 2006Assignee: GemplusInventors: Jean-Sebastien Coron, Pascal Paillier
-
Patent number: 7114075Abstract: Apparatus of the present invention comprises a control unit controlling comparison of identifying information input by a user with identifying information stored in a storage medium, which also stores authentication information for applications corresponding to the stored identifying information. The apparatus also comprises a set unit setting, as input information for authentication system of one of the applications, the authentication information the storage medium sends to the set unit responsive to a result of the comparison.Type: GrantFiled: April 4, 2000Date of Patent: September 26, 2006Assignee: Fujitsu LimitedInventors: Hideto Yasuda, Tomohito Osawa
-
Patent number: 7099474Abstract: A key and lock device comprises a key having a first electronic circuit and a lock having a second electronic circuit. The key and the lock store secret information, some of which is unique for each device. The key and the lock exchange a random number through connectors and perform a calculation in the respective circuitry based on the random number and secret information. An electrical blocking mechanism is moved to a non-blocking position if a comparison of the calculations in the circuits gives the correct result.Type: GrantFiled: May 5, 2000Date of Patent: August 29, 2006Assignee: Assa Abby ABInventors: Inge Lidén, Rolf Norberg, Björn Magnusson, Johan Warnström, Reijo Hakkarainen, Hannu Sivonen, Gudrun Brennecke, Christophe Chanel, Jens Gürtler, Jürgen Krühn, Alain Varenne, J M Thomas, Lance Schoell, Gilbert Andre, Christian Darmanin, Arnaud Lefebvre, Walter Hammer, Claude-Eric Jaquet, Nicolas Peguiron
-
Patent number: 7073069Abstract: A digital logic circuit comprises a programmable logic device and a programmable security circuit. The programmable security circuit stores a set of authorized configuration security keys. The programmable security circuit compares the authorized configuration security keys with an incoming configuration request, and selectively enables a new configuration for the programmable logic device in response to the configuration request. In another exemplary embodiment, a programmable security circuit also stores a set of authorized operation security keys. The programmable security circuit compares the authorized operation security keys with an incoming operation request from the programmable logic device, and selectively enables an operation within the programmable logic device in response to the operation request.Type: GrantFiled: May 5, 2000Date of Patent: July 4, 2006Assignee: Infineon Technologies AGInventors: Stephen L. Wasson, David K. Varn, John D. Ralston
-
Patent number: 7058804Abstract: A data storing system is provided, wherein the data storing system includes: a user apparatus; an issuing apparatus which issues a registration certificate; a data providing apparatus; an issuer registration apparatus; and a data registration apparatus; wherein the user apparatus includes: a part which generates registration information on a key including a user public key, sends the registration information to the issuing apparatus with user information; and a part which verifies a registration certificate, received from the issuing apparatus, which is signature information of the issuer for the registration information and the user information, stores the registration certificate to a storage device when the registration certificate is verified; wherein the issuing apparatus includes a part which generates the registration certificate and sends the registration certificate to the user apparatus.Type: GrantFiled: August 29, 2000Date of Patent: June 6, 2006Assignee: Nippon Telegraph and Telephone CorporationInventors: Hideki Akashika, Shinichi Hirata, Nagaaki Ohyama, Akio Kokubu
-
Patent number: 7055033Abstract: Various embodiments pertain to an integrated circuit (IC) device, such as smart cards, electronic wallets, PC cards, and the like, and various methods for steganographically authenticating identities and authorizing transactions based on the authenticated identities.Type: GrantFiled: May 21, 2004Date of Patent: May 30, 2006Assignee: Microsoft CorporationInventor: Scott B. Guthery
-
Patent number: 7047409Abstract: A method of automatically tracking a certificate pedigree is provided, in which a new user is provided with a piece of hardware containing a predetermined pedigree certificate stored therein, the predetermined pedigree certificate having a level of trust bearing a relationship to a category of hardware of which the provided piece of hardware is a member. An automated registration arrangement is provided which can be accessed only by users having a piece of hardware containing a predetermined pedigree certificate having a specified level of trust stored therein. When the new user accesses the automated registration arrangement using the provided piece of hardware, the automated registration arrangement provides the new user with an individual signature certificate having a level of trust commensurate with that of the pedigree certificate.Type: GrantFiled: October 16, 2000Date of Patent: May 16, 2006Assignee: Northrop Grumman CorporationInventors: Kenneth W. Aull, Vincent J. McCullough
-
Patent number: 7039808Abstract: Method for checking the signature of a message, the message, signature, and a certificate having been sent by a signer having a public key to a recipient having a message storage device.Type: GrantFiled: March 17, 2000Date of Patent: May 2, 2006Assignee: Axalto SAInventor: Arnaud Fausse
-
Patent number: 7028186Abstract: The security keys in the mobile terminals and access points of a wireless local area network (WLAN) are created, utilized and managed for a communication session between a mobile terminal and access point. Both the WLAN link level security protection and IP security functions of the network use the same Internet Key Exchange (IKE) key management protocol and use certificates in the same certificate hierarchy. When the mobile terminals associates with the network, it uses the IKE protocol with private keys and certificates to generate WLAN link level keys with the access point and provide mutual authentication.Type: GrantFiled: February 11, 2000Date of Patent: April 11, 2006Assignee: Nokia, Inc.Inventors: Jorma Stenman, Harri Hansen, Juha Salvela
-
Patent number: 7027880Abstract: Re-certification of a control program loaded in a safety controller is avoided through the use of a digital snapshot and digital signature, the snapshot providing a rapidly loadable memory image file and the signature providing a confirmation that the file loaded matches a previously certified copy so as to avoid the need for time consuming re-certification.Type: GrantFiled: September 30, 2003Date of Patent: April 11, 2006Assignee: Rockwell Automation Technologies, Inc.Inventors: Joseph Paul Izzo, Norman Sievert Shelvik, Michael Dean Kalan, Charles Martin Rischar, Raymond Louis Buvel
-
Patent number: 6996722Abstract: In a data communications system a remote data source outputs data as a series of application data units (ADUs). Each ADU is individually encrypted with a different key. The keys are transmitted (for example using Internet multicasting) via a communications network to one or more customer terminals. At the terminals a sequence of keys is generated for use in decrypting the ADUs. A record is kept of the keys generated, and this record may subsequently be used to generate a receipt for the data received by the customer. The keys may be generated, and the record stored within a secure module such as a smartcard.Type: GrantFiled: December 15, 1998Date of Patent: February 7, 2006Assignee: British Telecommunications public limited companyInventors: Ian R Fairman, Robert J Briscoe
-
Patent number: 6990579Abstract: In one embodiment, a method of remote attestation for a special mode of operation. The method comprises storing an audit log within protected memory of a platform. The audit log is a listing of data representing each of a plurality of IsoX software modules loaded into the platform. The audit log is retrieved from the protected memory in response to receiving a remote attestation request from a remotely located platform. Then, the retrieved audit log is digitally signed to produce a digital signature for transfer to the remotely located platform.Type: GrantFiled: March 31, 2000Date of Patent: January 24, 2006Assignee: Intel CorporationInventors: Howard C. Herbert, David W. Grawrock, Carl M. Ellison, Roger A. Golliver, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger, Ken Reneris, James A. Sutton, Shreekant S. Thakkar, Millind Mittal
-
Patent number: 6981148Abstract: A verification method and system including a verifier which can both interpret policies and determine if they are satisfied, and request and obtain relevant certificates. This new architecture includes a verifier which itself can both direct a retrieval mechanism and use a local database of information. Users and applications can obtain and supply certificates to the verifier and the local database. The verifier may invoke a retrieval mechanism to obtain necessary certificates from other authenticated data servers and store them in a secondary database. The flexibility to allow for both on-line and off-line authenticated data server responses for verification is encompassed, as is an enhanced system for security including revocation of certificates using a polarity discipline, which allows data used for revocation to be handled with the same system used for other verification data without imperiling security.Type: GrantFiled: April 29, 2000Date of Patent: December 27, 2005Assignee: University of PennsylvaniaInventors: Trevor Jim, Carl A. Gunter
-
Patent number: 6981147Abstract: A method for creating, storing and reading a new certificate type for certification of keys is provided. In the new certificate type, several certificates, containing a minimum quantity of redundant data fields, are collated to form one certificate and all redundant information on the certificates is eliminated. An embodiment of the new certificate type is the group certificate. The group certificate is used where several keys are to be issued at the same time for the same user by the same certification instance. By means of the group certificate, all redundant data elements are eliminated and all data elements for a set of several keys subject to certification are grouped into one certificate. This substantially reduces the memory requirement, and handling of the certificates is simplified for the communication partners. A further embodiment of the new certificate type is the basic and supplementary certificate combination.Type: GrantFiled: January 14, 2000Date of Patent: December 27, 2005Assignee: International Business Machines CorporationInventors: Ernst-Michael Hamann, Jutta Kreyss, Narayanan Vasudevan
-
Patent number: 6980660Abstract: A method and system for enabling wireless devices distributed throughout an enterprise to be efficiently initialized for secure communications. The method and system utilize well known public key cryptography and machine unique identifiers to establish a secure channel and initialize the wireless devices.Type: GrantFiled: May 21, 1999Date of Patent: December 27, 2005Assignee: International Business Machines CorporationInventors: John Raithel Hind, Marcia Lambert Peters
-
Patent number: 6973191Abstract: A data processing method and system for generating a unique symmetric key inside a PSD having limited trust relationships between PSD manufacture, PSD issuer, subsequent service providers and a trusted third party.Type: GrantFiled: November 2, 2001Date of Patent: December 6, 2005Assignee: ActivcardInventors: Yves Louis Gabriel Audebert, Eric F. Le Saint
-
Patent number: 6954855Abstract: Various embodiments pertain to an integrated circuit (IC) device, such as smart cards, electronic wallets, PC cards, and the like, and various methods for steganographically authenticating identities and authorizing transactions based on the authenticated identities.Type: GrantFiled: December 23, 2004Date of Patent: October 11, 2005Assignee: Microsoft CorporationInventor: Scott B. Guthery
-
Patent number: 6950941Abstract: Systems connected to users generate a plurality of keys which are mutually shared, and download and upload digital contents by using secret channels formed between the systems. An information provider receives an authorization from a certificate authority. A licensed SDMI compliant module (LCM) is authenticated through the information provider, and the information provider and the LCM form a channel. A portable device is authenticated from the information provider through the LCM, and the LCM and the portable device form a channel. The digital content between the LCM and the portable device is downloaded and uploaded according to respective control state data of the LCM and the portable device. The system can use a physical address of a bad sector formed in the portable medium during the manufacturing process for preventing an illegal copy of the downloaded digital contents through the portable device after the digital contents have been downloaded.Type: GrantFiled: April 30, 1999Date of Patent: September 27, 2005Assignee: Samsung Electronics Co., Ltd.Inventors: Chang-Hyi Lee, Ho-Suk Chung, Eun-Seong Kang
-
Patent number: 6934840Abstract: An apparatus and method for managing keystores is implemented. A distributed keystore is established by aggregating individual. The distributed keystore may, be organized in a multi-level structure, which may be associated with an organizational structure of an enterprise, or other predetermined partitioning. Additionally, a centralized management of certificates may be provided, whereby the expiration or revocation of the certificates may be tracked, and expired or revoked certificates may be refreshed. The keystore may be updated in response to one or more update events.Type: GrantFiled: December 21, 2000Date of Patent: August 23, 2005Assignee: International Business Machines CorporationInventors: Bruce Arland Rich, Julianne Yarsa, Theodore Jack London Shrader, Donna Skibbie
-
Patent number: 6925560Abstract: Prior to the execution of a program contained in a second chip card inserted in a terminal such as a mobile radio telephone terminal, in addition to a first chip card containing data and connected to a telecommunication network to which the terminal is linked, one of the cards is authenticated by the other, or the two cards are authenticated mutually. This double authentication ensures the authenticity of the program for its overall execution in the terminal and the origin of the second card, distributed through conventional channels, for the network operator.Type: GrantFiled: June 5, 2000Date of Patent: August 2, 2005Assignee: GemplusInventor: Bruno Basquin